IRVINE, Calif.–(BUSINESS WIRE)–Inspiring the market to interact versus transact and to think differently about business transformation and technology innovation, Ingram Micro Inc. today announced its new Global Cloud and Innovation Summit is taking place May 15-17, 2023, in Las Vegas…
Category: Cybersecurity Insiders
(ISC)² New Jersey Chapter Hosts International Event with 500 Attendees
The (ISC)² New Jersey Chapter held their first virtual international event, which hosted more than 20 thought leaders and 500 registered chapter member attendees. The International (ISC)² Chapter Conference, SECON International, took place virtually, on December 1, 2022, and delivered…
Improve your AWS security posture, Step 2: Avoid direct internet access to AWS resources
In the first blog in this series, we discussed setting up IAM properly. Now we’re moving on to the second step, avoiding direct internet access to AWS resources. When AWS resources like EC2 instances or S3 buckets are directly accessible…
Hive Ransomware gang website seized by FBI and Europol
In what comes as a surprise to criminals operating in the cyberworld, the website that used to act as a data leak platform for hive ransomware gang seems in control of the US law enforcement now. According to the notice…
US Federal agencies fall prey to Phishing Scam via Remote Management Software
United States Cybersecurity and Infrastructure Security Agency (CISA) along with two other agencies; National Security Agency (NSA) and Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued a warning to federal agencies against a phishing scam taking place through Remote…
Impact Podcast with John Shegerian Features Daring’s Ross Mackay
LOS ANGELES–(BUSINESS WIRE)–Ross Mackay, CEO and Founder of Daring, is the featured guest this week on the Impact Podcast with John Shegerian. The show is hosted by Shegerian, Co-Founder and Chairman/CEO of ERI, the nation’s leading fully integrated IT and…
Uprite Services Ranked on Channel Futures 2022 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide
HOUSTON–(BUSINESS WIRE)–Uprite Services has been named one of the world’s premier managed service providers (MSPs) in the prestigious 2022 Channel Futures MSP 501 rankings. For the past 16 years, MSPs worldwide have applied for a spot on this prestigious and…
The Cyber AB Announces New Members to its Board of Directors
NATIONAL HARBOR, Md.–(BUSINESS WIRE)–The Cyber AB officially announced the appointment of four new Directors to its governing Board. Debbie Taylor Moore, Anthony Johnson, Gene Chao, and Katherine Gronberg all joined the Board as full voting Directors and will participate in…
Agency Spotter Announces Expansion Into IT & Development Services
ATLANTA–(BUSINESS WIRE)–Agency Spotter, the world’s most trusted marketplace for brands to discover, review, and manage marketing agencies, is thrilled to announce the expansion featuring IT and software development service providers. The public SaaS marketplace has added 12 new services under…
ISACA Awards Celebration to Recognize Outstanding Digital Trust Professionals for Impactful Contributions
SCHAUMBURG, Ill.–(BUSINESS WIRE)–Each year ISACA members and digital trust professionals worldwide serve their organizations, industries and communities with exemplary achievements and noteworthy contributions to advancing technology. Outstanding professionals in the areas of IT audit, risk, governance, privacy and cybersecurity are…
Cypherbridge Enhances Security and Interoperability for IoT Devices with Support for New PX5 RTOS
SAN DIEGO–(BUSINESS WIRE)–Cypherbridge Systems, a leading provider of secure IoT software solutions, today announced the integration of its SDKPac and uLoadXL IoT software with the new PX5 real-time operating system (RTOS). The integrated solution accelerates the development of IoT platforms,…
Cyberattacks Spark Demand for Industrial Security Solutions
STAMFORD, Conn.–(BUSINESS WIRE)–Rising threats to vehicles and to industrial operational technology (OT) have led a growing number of enterprises worldwide to invest in advanced technologies and services to better secure their assets, according to a new research report published today…
Help Shape the CGRC Exam – Formerly Known As CAP
As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…
InQuest Appoints Andre Ludwig as Chief Product Officer
AUSTIN, Texas–(BUSINESS WIRE)–InQuest, a leading provider of File Detection and Response solutions focused on protecting the end-user, announced today the appointment of Andre Ludwig as its Chief Product Officer. Andre brings extensive cybersecurity experience and product management leadership through numerous…
CISSP-ISSAPs – We Need Your Input
With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…
OSC Edge Earns Recurring Spot on Washington Technology’s 2022 Fast 50 List and Rewards Employees with Additional Bonus
ATLANTA–(BUSINESS WIRE)–Open SAN Consulting LLC (dba OSC Edge), a leading IT enterprise solutions firm specializing in engineering Information Technology and Cybersecurity solutions for the US Public Sector, was named by Washington Technology as a 2022 Fast 50 Honoree. The publication…
Cloud Range Launches the First OT/ICS Cyber Range for Live-Fire Training to Reduce Risk from Cyber Attacks on Critical Infrastructure
NASHVILLE, Tenn.–(BUSINESS WIRE)–Cloud Range, the industry’s leading cyber range solution to reduce cyber risk across the organization, today introduced Cloud Range for Critical Infrastructure—the first-of-its-kind full-service, live-fire simulation training specifically designed to proactively train and prepare incident responders (IR) and…
Public Safety Threat Alliance Joins CISA’s Joint Cyber Defense Collaborative to Enhance Cybersecurity Posture of United States and Strategic International Partners
CHICAGO–(BUSINESS WIRE)–Motorola Solutions (NYSE: MSI) today announced the Public Safety Threat Alliance (PSTA) has become a member of the Joint Cyber Defense Collaborative (JCDC), the premier cybersecurity public-private partnership established by the Cybersecurity and Infrastructure Security Agency (CISA). The PSTA…
NETSCOUT Appoints Shannon Nash and Marlene Pelage to Board of Directors
WESTFORD, Mass.–(BUSINESS WIRE)–NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced that experienced executives Shannon Nash and Marlene Pelage have been appointed to the Company’s Board of Directors. “On behalf of…
SpyCloud Compass Reduces Ransomware Risk with Post-Infection Remediation
AUSTIN, Texas–(BUSINESS WIRE)–SpyCloud, the leader in operationalizing Cybercrime Analytics (C2A), today announced the launch of Compass, a transformative solution to help enterprises detect and respond to the initial precursors to ransomware attacks. Compass provides definitive evidence that data siphoned by…
Apple launches educational video resources to iPhone users on Data Privacy Day
On the occasion of ‘Data Privacy Day’ that falls on January 28th of this year, Apple Inc, the technology giant of America, has released a set of educational resources that allows users to take full-control of their data. Since…
2023 Predictions: Emerging Tech & Global Conflict Bring New Cyber Threats
By Immanuel Chavoya, Emerging Threat Expert, SonicWall 2022 saw a shifting cybersecurity landscape as rising geopolitical conflicts brought new tactics, targets, and goals for cybercrime. According to recent threat intelligence from SonicWall, global ransomware attempts declined 31% YoY as cybercriminals…
Google advertisements turning into malware spreading platforms
The next time when you search for a software download on the Google search engine, be cautious, as the software might also bring in new trouble as malware or might strictly act as a source to malware spread that can…
BrandShield Recognized by Frost & Sullivan as a Leader in Digital Risk Protection Services
NEW YORK–(BUSINESS WIRE)–BrandShield (LSE: BRSD), a cybersecurity company specializing in monitoring, detecting, and removing online threats, today announced its recognition as a Leader in Frost & Sullivan’s Radar for Digital Risk Protection Services. BrandShield’s proprietary, AI/ML-powered platform enables brands to…
F5 Reports 2% Revenue Growth in its First Quarter of Fiscal Year 2023
SEATTLE–(BUSINESS WIRE)–F5, Inc. (NASDAQ: FFIV) today announced financial results for its first quarter of fiscal year 2023. “Customers are focused on minimizing their spend and optimizing their existing investments while also continuing to drive revenue,” said François Locoh-Donou, F5’s President…
New Tech Port Center + Arena Renamed Boeing Center at Tech Port
SAN ANTONIO–(BUSINESS WIRE)–An innovative new partnership between Boeing [NYSE: BA] and the Kelly Heritage Foundation—an educational nonprofit organization affiliated with Port San Antonio, on whose behalf ASM Global manages Tech Port Center + Arena—will expand STEM learning and workforce development…
ERI Brings Carbon Neutral, SOC 2 Compliant Circular Economy Innovations to California Businesses
FRESNO, Calif.–(BUSINESS WIRE)–ERI, the nation’s largest fully integrated IT and electronics asset disposition (ITAD) provider and cybersecurity-focused hardware destruction company, now maintains nine state-of-the-art e-waste recycling facilities, including its original flagship location in Fresno, California. ERI has been providing comprehensive…
Conning Survey: U.S. Insurers Expected to Increase Investment Risk Tolerance Amid Concerns of Higher Volatility and Inflation
HARTFORD, Conn.–(BUSINESS WIRE)–U.S. insurers are expected to increase their risk tolerance and grow portfolio allocations to private assets amid their concerns about higher market volatility and inflation, according to a new survey of U.S. life and property & casualty (P&C)…
Sysdig Grows New Customers by 120%, Appoints New Chief Marketing Officer
SAN FRANCISCO–(BUSINESS WIRE)–Sysdig Inc., the unified cloud and container security leader, today announced the appointment of Bryce Hein to the position of Sysdig chief marketing officer (CMO) after the company experienced more than 120% in new customer growth last year.…
SentinelOne Announces Executive Appointments and Promotions Amidst Rapid Growth
MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–SentinelOne (NYSE: S), an autonomous cybersecurity platform company, today announced key executive appointments and promotions that will fuel the growth of its best-in-class cybersecurity platform and scale forward its go-to-market operations. Mitra Mahdavian has been appointed to…
Halo Security Platform Now Offers Visibility to the Vulnerabilities That Matter Most
SAN FRANCISCO–(BUSINESS WIRE)–The number of common vulnerabilities and exposures (CVEs) has grown each year since 2016, leaving security teams exceedingly burdened and constantly chasing vulnerabilities that may be considered low priority to them. Halo Security recently implemented a new feature…
Venafi Introduces TLS Protect for Kubernetes to Simplify Cloud Native Machine Identity Management
SALT LAKE CITY–(BUSINESS WIRE)–Venafi®, the inventor and leading provider of machine identity management, today introduced TLS Protect for Kubernetes. As part of the Venafi Control Plane for machine identities, TLS Protect for Kubernetes enables security and platform teams to easily…
FireTail Names Timo Rüppell as Vice President of Product
MCLEAN, Va.–(BUSINESS WIRE)–FireTail Inc., a disruptor in API security, today announced the appointment of Timo Rüppell to the executive leadership team as Vice President of Product. In conjunction with bringing Rüppell on board, FireTail also opened a new company office…
Working with AWS to secure your data against attack
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Amazon Web Services (AWS) is home to almost…
China spies on the UK populace with microchips
Britain populace should start being cautious with smart appliances as security analysts suggest that china might have started a spying campaign on them via domestic appliances. Yes, what you’ve read is right! There is a fair amount of chance that…
2023 Insider Threat Report Finds Three-Quarters of Organizations are Vulnerable to Insider Threats
By Sanjay Raja, VP of Product Marketing and Solutions Insider threats are more dangerous and more top of mind for security pros in 2022 than they’ve ever been. That’s one of the major findings from the 2023 Insider Threat Report…
The Indian Ministry of External Affairs Email servers were hacked and data leaked
The Ministry of External Affairs(MEA) of India is in news for becoming a target of a cyber attack that led to the data breach and now data sale. According to an update released to the press, the email servers of…
PCI Successfully Completes SOC/FISMA Examinations for 2022
NORMAN, Okla.–(BUSINESS WIRE)–PCI Energy Solutions is pleased to announce its successful completion of the Service Organization Controls 1 Type II (SOC 1 Type II) and Service Organization Controls 2 Type II (SOC 2 Type II) attestation issued under the American…
Latest Cyberthreats and Advisories – January 6, 2023
The LockBit ransomware gang apologizes, Google settles privacy lawsuits and cybercriminals impersonate brands and the U.K. government. Here are the latest threats and advisories for the week of January 6, 2023. Threat Advisories and Alerts Cybercriminals Impersonate Brands with Search…
CACI Awarded $284 Million Contract by National Security Agency
RESTON, Va.–(BUSINESS WIRE)–CACI International Inc (NYSE: CACI) announced today that it has been awarded a single-award prime contract worth up to $284 million by the National Security Agency (NSA) to provide mission expertise and systems engineering support for NSA’s Cybersecurity…
United States Transformative Mega Trends Report 2022-2030: Focus on Connectivity, Cognitive Era, Security and Defense, Smart is the New Green – ResearchAndMarkets.com
DUBLIN–(BUSINESS WIRE)–The “Transformative Mega Trends in the United States through 2030” report has been added to ResearchAndMarkets.com’s offering. This research service examines the technological advancements and convergences led by major shifts in artificial intelligence, cognitive computing, 5G, blockchain and digital…
AI and Cybersecurity: Some observational implications of the intersection between the two
There is a possibility that artificial intelligence (AI) will have a significant influence, in either a good or bad direction, on cybersecurity. On the plus side, artificial intelligence (AI) can be used to automate and improve many parts of cybersecurity.…
Real Talk with CCSPs An interview with Vanessa Leite, CCSP, CISSP
We often hear that cybersecurity certifications have a global reach. When we spoke with Vanessa Leite we learned how true that actually is. Vanessa holds several certifications, including vendor-specific ones, along with the CISSP and CCSP credentials from (ISC)². She…
Arnold Clark data breach leads to identity theft
A few days ago, the servers of car dealer ‘Arnold Clark’ were breached by hackers and the information of 1000sof motorists was stolen that can lead to identity thefts and online frauds. The threat actors are adamant in their demand…
Google to layoff 12k workers as its AI focus intensifies
After the launch of ChatGPT AI Chatbot, most of the technology company heads like Elon Musk and Satya Nadella feared that the deployment might lead to layoffs in many companies. Keeping aside others, Google, the Alphabet Inc’s business subsidiary, says…
Telephony fraud and risk mitigation: Understanding this ever-changing threat
Telephony fraud is a significant challenge. Companies of all sizes and industries are subjected to the malicious usage of voice and SMS with the intent of committing financial fraud, identity theft, denial-of-service, and a variety of other attacks. Businesses that…
How do the latest iPhone updates address Cybersecurity issues?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Apple is typically known for its minimal design,…
Bitdefender Internet Security Named AV-Comparatives’ Product of the Year
BUCHAREST, Romania & SANTA CLARA, Calif.–(BUSINESS WIRE)–Bitdefender, a global cybersecurity leader, today announced Bitdefender Internet Security has once again been named Product of the Year, for the highest overall scores throughout all 2022 tests, by AV-Comparatives, an industry leading independent…
Policy Brief – U.S. Cyber Threat Intelligence, Part 2: Summary, Recommendations & Challenges
By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18…
Travelers Institute to Host Cybersecurity Symposium in Phoenix
PHOENIX–(BUSINESS WIRE)–The Travelers Institute, the public policy division of The Travelers Companies, Inc. (NYSE: TRV), will host an in-person Cyber: Prepare, Prevent, Mitigate, Restore® symposium on Thursday, Jan. 26, in Phoenix. The event, which is part of a national series,…
Predictions 2023, Part 1: What will the new year bring for the InfoSec Community?
By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP In recent years, we have seen the threat landscape become increasingly complex as threat actors use sophisticated techniques to exploit vulnerabilities of weak passwords, missing patches and antiquated software, thus gaining access to…
Arcserve Unified Data Protection 9.0 Boosts Enterprise Data Resilience
EDEN PRAIRIE, Minn.–(BUSINESS WIRE)–Arcserve, the world’s most experienced provider of backup, recovery and immutable storage solutions for unified data resilience against ransomware and disasters, today unveiled Arcserve Unified Data Protection (UDP) 9.0. Arcserve UDP 9.0 is a single platform, centrally…
(ISC)² New Jersey Chapter Hosts International Event with 500 Attendees
The (ISC)² New Jersey Chapter held their first virtual international event, which hosted more than 20 thought leaders and 500 registered chapter member attendees. The International (ISC)² Chapter Conference, SECON International, took place virtually, on December 1, 2022, and delivered…
Key to success while implementing IAM- Best practices that every company should implement
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Identity and access management has emerged as an…
DefenseStorm Named Inc. 5000 Fastest-Growing Private Company with 251% Growth Rate
ALPHARETTA, Ga.–(BUSINESS WIRE)–DefenseStorm, a leading cloud-based cybersecurity, cyber fraud and cyber compliance management provider to regional and community banks and credit unions, today announced separate recognitions for its exceptional growth, transformative financial services solutions and customer loyalty. With impressive three-year…
LATEST CYBERTHREATS AND ADVISORIES – JANUARY 20, 2023
TikTok is fined for a privacy violation, major corporations suffer breaches and Vice Society attacks another school. Here are the latest threats and advisories for the week of January 20, 2023. Threat Advisories and Alerts U.K. School Survey Reveals Surprising…
IT/OT convergence and Cybersecurity best practices
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Most of the time, the advantages of technology…
AT&T Cybersecurity awarded the Palo Alto Networks 2022 Partner of the Year Award
AT&T Cybersecurity received the Palo Alto Networks 2022 Partner of the Year Award for its managed security services at the annual Palo Alto Networks Ignite 2022 conference. The awards are presented to an elite group of Palo Alto Networks partners…
ISG to Publish Reports Evaluating Cybersecurity Providers
STAMFORD, Conn.–(BUSINESS WIRE)–Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm, has launched a research study examining how cybersecurity providers can help enterprises and U.S. public sector organizations reduce cyberthreats and better protect their valuable…
Hacker steals data of 37 million T Mobile customers
T Mobile hack is back in news as the telecom company is accusing a hacker of fraudulently stealing customer data from its servers. Earlier, the company was targeted by a sophistication filled digital attack. But now, the company has made…
Cyber Attack news headlines trending on Google
The first news that is trending is associated with financial service provider PayPal. News is out that social security numbers of nearly 35,000 users were leaked in a cyber attack that could have emerged from a credential stuffing campaign launched…
Impact Podcast with John Shegerian Features The Home Depot’s Ron Jarvis
LOS ANGELES–(BUSINESS WIRE)–Ron Jarvis, Chief Sustainability Officer for The Home Depot, is the featured guest this week on the Impact Podcast with John Shegerian. The show is hosted by Shegerian, Co-Founder and Executive Chairman of ERI, the nation’s leading fully…
Are WE the firewall?
As we start a new year, let's think about how we can draw up a plan to exercise our cyber fitness and make it a culture that sticks. It's a critical time to get this done as we work toward…
CyberGRX Leverages MITRE Techniques to Uncover Security Gaps in Third Parties
DENVER–(BUSINESS WIRE)–CyberGRX, provider of the world’s first and largest global risk exchange, today announced the availability of a Predictive Data tool to the Exchange platform’s Attack Scenario Analytics feature. Customers can leverage CyberGRX’s predictive risk intelligence capabilities, which has up…
[redacted] Taps Adam Flatley to Lead [rTIC Ghost Group
AUSTIN, Texas–(BUSINESS WIRE)–Redacted, the mission-driven cybersecurity company that levels the playing field against attackers, today announced that Adam Flatley has been promoted to Vice President of Intelligence leading the Redacted Intelligence Cell, recently renamed [rTIC Ghost Group. The team of…
Independent Research Firm Analysis Found 87% Reduction in Time to Resolve Threats with ExtraHop
SEATTLE–(BUSINESS WIRE)–ExtraHop, the leader in cloud-native network detection and response, today announced the results of The Total Economic Impact™ Of ExtraHop Reveal(x) 360. The study, conducted by Forrester Consulting and commissioned by ExtraHop, reveals that a composite organization made up…
TuxCare Unveils OEM Partner Program for Best-in-Class Vulnerability Patching
PALO ALTO, Calif.–(BUSINESS WIRE)–TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced the launch of its TuxCare OEM Partner Program that aims to easily arm OEM partners with its award-winning KernelCare Enterprise and LibCare solutions. OEMs can now…
HUMAN Orchestrates Unprecedented Private Takedown, VASTFLUX
NEW YORK–(BUSINESS WIRE)–HUMAN Security, Inc., the global leader in safeguarding enterprises from digital attacks with modern defense, today announced the takedown of a highly sophisticated ad fraud operation where more than 1,700 apps were spoofed, targeting 120 publishers, running ads…
LATEST CYBERTHREATS AND ADVISORIES – JANUARY 13, 2023
Cybercriminals attack schools, the FCC looks to change data breach rules and artificial intelligence alters the cybersecurity landscape. Here are the latest threats and advisories for the week of January 13, 2023. Threat Advisories and Alerts How Businesses Can Securely…
Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest
In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. In this blog, we’ll tackle encrypting AWS in transit and at rest. Sometimes, despite all efforts to the contrary, data…
Understanding Malware-as-a-Service (MaaS): The future Of cyber attack accessibility
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. With the explosive growth of technology, businesses are…
Ransomware attack on Yum Brands Inc closes 300 restaurants in the UK
Yum Brands Inc, officially the owner of top food chain restaurants KFC, Taco Bell and Pizza Hut, was reportedly hit by a ransomware attack, forcing the IT staff to close about 300 eatery outlets across the United Kingdom. As the…
Microsoft works with partners on Cybercrime Atlas
Microsoft, in association with Fortinet and other partners, is working on mapping cyber crime activities and attain responses to cyber threats on public and private entities. The program was developed in the year 2019 and after a long pause, the…
CloudSEK offers a search engine to detect malicious apps
CloudSEK has developed a new app called BeVigil that can help search malicious apps downloaded on a mobile phone and collect data on what permissions and data they were accessing and processing. All these days, smart phone users were downloading…
ECS Announces Sponsorship with Old Glory DC for 2023 Major League Rugby Season
FAIRFAX, Va.–(BUSINESS WIRE)–ECS, a leader in advanced technology, science, and digital transformation solutions, extends its sponsorship with Old Glory DC, Washington D.C.’s professional rugby team, through the 2023 Major League Rugby (MLR) Season. ECS joins the Old Glory DC family…
Israeli Mission to the UN, Israel’s National Cyber Directorate and Team8, Host Cyber Security Event at UN
NEW YORK–(BUSINESS WIRE)–The Permanent Mission of Israel to the United Nations, in cooperation with Israel’s National Cyber Directorate (INCD) and Team8, hosted a cyber-security event yesterday at the United Nations (UN) to discuss the ways in which countries, governments and…
ERI Opens New State-of-the-Art ITAD & Electronics Recycling Facility in Arizona
GOODYEAR, Ariz.–(BUSINESS WIRE)–ERI, the nation’s largest fully integrated IT and electronics asset disposition (ITAD) provider and cybersecurity-focused hardware destruction company, announced today that due to steadily continued growth, it has opened a new recycling facility in Goodyear, Arizona (near Phoenix)…
CISSP-ISSAPs – We Need Your Input
With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…
Improve your AWS security posture, Step 2: Avoid direct internet access to AWS resources
In the first blog in this series, we discussed setting up IAM properly. Now we’re moving on to the second step, avoiding direct internet access to AWS resources. When AWS resources like EC2 instances or S3 buckets are directly accessible…
CSI Banking Priorities Executive Report Reveals Bankers Will Deploy Customer-Centric Features for Retention in 2023
PADUCAH, Ky.–(BUSINESS WIRE)–Computer Services, Inc. (CSI), a leading provider of end-to-end fintech and regtech solutions, today released its eighth-annual Banking Priorities Executive Report. The report is based on the company’s yearly research initiative that asks bank representatives to reflect on…
QuSecure Achieves Critical Breakthrough in Post-Quantum Encryption Over Public Internet – Closes Loop for End-to-End Quantum-Safe Data Security
SAN MATEO, Calif.–(BUSINESS WIRE)–QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), today launched QuEverywhere™, its most recent breakthrough in quantum-safe cryptography orchestration. QuEverywhere is the industry’s first quantum-safe orchestration solution protecting encrypted private data on any website or mobile application…
Latest Cyberthreats and Advisories – December 23, 2022
Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022. Threat Advisories and Alerts Criminal Actors Use BEC Attacks…
nsKnox Raises $17 Million From Link Ventures, Harel Insurance and Existing Investors Including M12 and Viola Ventures to Meet Growing Demand for B2B Payment Security & Compliance Solutions
NEW YORK–(BUSINESS WIRE)–nsKnox, the global leader in Bank Account Validation and B2B Payment Security, announced today a new funding round of $17 million, bringing its total funding to date to $35.6M. Two new investors, U.S.-based Internet & technology venture capital…
The dos and don’ts of ransomware negotiations
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Has your organization suddenly been attacked by a…
Telephony fraud and risk mitigation: Understanding this ever-changing threat
Telephony fraud is a significant challenge. Companies of all sizes and industries are subjected to the malicious usage of voice and SMS with the intent of committing financial fraud, identity theft, denial-of-service, and a variety of other attacks. Businesses that…
Help Shape the CGRC Exam – Formerly Known As CAP
As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…
Three easy steps to dramatically improve your AWS security posture: Step 1, set up IAM properly
Have you ever heard the saying that the greatest benefit of the cloud is that limitless resources can be spun-up with just a few clicks of the mouse? If so, you would be best served by forgetting that saying altogether. …
How do the latest iPhone updates address Cybersecurity issues?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Apple is typically known for its minimal design,…
Difference between Cybersecurity and Information Security
Many of you get confused with terms cybersecurity and Information Security and think that both these words are same and synonymous. However, in reality, both these terms are different and confused with one another. Cybersecurity is one of the significant…
Importance of having a Threat Intelligence Platform
First, a Threat Intelligence Platform (TIP) is nothing but a converged form of information aggregating platform that helps an organization gain insights on the latest attack campaigns and treats developing in the current cyber threat landscape. It helps organizations in…
MassChallenge and MITRE Select 10 Startups for the MITRE Social Innovation Mentorship Program
BOSTON–(BUSINESS WIRE)–MassChallenge, in partnership with MITRE, today announced a cohort of 10 startups participating in the MITRE Social Innovation Mentorship Program. The selected companies, all led by founders from under-represented backgrounds, impressed judges with their high-impact, innovative work. The startups’…
Trellix Endpoint Scores 100% Detection with Zero False Positives in Latest SE Labs Endpoint Security Test
SAN JOSE, Calif.–(BUSINESS WIRE)–Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced Trellix Endpoint Security (ENS) earned the highest AAA rating in the SE Labs Endpoint Security (EPS) 2022 Q4 test for both Enterprise…
ERI Becomes First Electronic Recycler & ITAD Company to Achieve Official Carbon Neutral Status
NEW YORK–(BUSINESS WIRE)–ERI, the nation’s largest fully integrated IT and electronics asset disposition (ITAD) provider and cybersecurity-focused hardware destruction company, announced today that it is now 100% carbon neutral for all of its operational emissions nationwide. Through years of dedication…
Hypori, Inc. Secures Series B to Redefine Zero-Trust BYOD
RESTON, Va.–(BUSINESS WIRE)–Hypori, an award-winning SaaS company transforming secure access to data from the edge, announced today the close of an initial $10.5 million Series B investment led by Hale Capital Partners with additional funds from Series A investor GreatPoint…
Latest Cyberthreats and Advisories – January 6, 2023
The LockBit ransomware gang apologizes, Google settles privacy lawsuits and cybercriminals impersonate brands and the U.K. government. Here are the latest threats and advisories for the week of January 6, 2023. Threat Advisories and Alerts Cybercriminals Impersonate Brands with Search…
Key to success while implementing IAM- Best practices that every company should implement
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Identity and access management has emerged as an…
Veeam Research Finds IT Leaders Feel Increasingly Unprotected from Cyberattacks and Other Disasters
COLUMBUS, Ohio–(BUSINESS WIRE)–Veeam® Software, the leader in Modern Data Protection, today released findings of the company’s fourth annual Data Protection Trends Report to better understand how data protection is evolving in a digital world. The survey found that companies are…
GrammaTech and T.E.N. Announce Winner of First Annual Product Security Executive of the Year Award
BETHESDA, Md. & ATLANTA–(BUSINESS WIRE)–GrammaTech, a leading provider of application security testing products and software research services, and T.E.N., founder of the Information Security Executive® (ISE®) of the Year Awards, today announced that Jason Christman, vice president and chief product…
ProArch Acquires Data Protection Firm Trum & Associates
ATLANTA–(BUSINESS WIRE)–ProArch, a global IT consulting and services organization, announced the acquisition of Trum & Associates (Trum), a data protection company with a deep understanding of regulatory compliance headquartered in Destin, Florida. The acquisition expands ProArch’s cybersecurity and governance, risk,…
TD SYNNEX Unveils New Fraud Defense Solution to Combat Widespread Security Risks
FREMONT, Calif. & CLEARWATER, Fla.–(BUSINESS WIRE)–TD SYNNEX (NYSE: SNX) announced today the launch of a new fraud defense solution integrating Microsoft Azure services for small and medium business (SMB) customers during a time of increasing threats within cloud environments. The…